浏览代码

Website: Bounty: Add rule for user interaction/social engineering (#4974)

bcoles 4 年之前
父节点
当前提交
c90b7881a7
共有 1 个文件被更改,包括 1 次插入0 次删除
  1. 1 0
      Meta/Websites/serenityos.org/bounty/index.html

+ 1 - 0
Meta/Websites/serenityos.org/bounty/index.html

@@ -21,6 +21,7 @@
         <li>The PoC exploit needs to work against the master branch at the time of claim.</li>
         <li>Max 5 bounties per person.</li>
         <li>No duplicates. If a bug is already reported, only the earliest reporter may claim the reward. This includes bugs found by continuous fuzzing systems.</li>
+        <li>No rewards for bugs that require unlikely user interaction or social engineering.</li>
         <li>Remote bugs must be exploitable with an unmodified "default setup" of SerenityOS. Bugs in programs that are not started by default don't qualify.</li>
         <li>The PoC exploit needs to work on a QEMU-emulated CPU that supports SMAP, SMEP, UMIP, NX, WP, and TSD natively.</li>
         <li>SerenityOS always runs with assertions enabled, so you'll need to find a way around them.</li>